Phishing-resistant multi factor authentication

The advent of the internet has revolutionized how people connect and interact, but it also brings various severe consequences such as data leakage when weak authentication method is implemented. Two-factor authentication(2FA) is a widely adopted method, yet vulnerabilities have been discovered to by...

Full description

Saved in:
Bibliographic Details
Main Author: Kuek, En Yee
Format: Final Year Project / Dissertation / Thesis
Published: 2025
Subjects:
Online Access:http://eprints.utar.edu.my/7183/1/fyp_CN_2025_KEY.pdf
http://eprints.utar.edu.my/7183/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1842131958533980160
author Kuek, En Yee
author_facet Kuek, En Yee
author_sort Kuek, En Yee
building UTAR Library
collection Institutional Repository
content_provider Universiti Tunku Abdul Rahman
content_source UTAR Institutional Repository
continent Asia
country Malaysia
description The advent of the internet has revolutionized how people connect and interact, but it also brings various severe consequences such as data leakage when weak authentication method is implemented. Two-factor authentication(2FA) is a widely adopted method, yet vulnerabilities have been discovered to bypass it. Traditional 2FA typically combines something a user knows (like a password) with something they have (like a temporary verification code from a physical device). However, this approach is still susceptible to attacks such as phishing attacks, especially Real-Time Phishing(RTP) attack. Location-based multi authentication (MFA) methods have been proposed to mitigate RTP techniques that exploit traditional OTP-based verification. By replacing the OTP mechanism with a geolocation verification step, it add a layer of security to the authentication process. Limitations on previously proposed location-based multi-factor authentication are additional user step for adaptation, mobile-based, and additional costs due to hardware requirements. This paper suggests incorporating location as an extra security layer while maintaining the user-friendliness and seamlessness of existing two-factor authentication methods, thus creating a user-friendly and seamless multifactor authentication solution. The performance of this proposed authentication method is evaluated against various attacks, notably RTP attack. Area of Study: Cybersecurity, Authentication Keywords: Multi-Factor Authentication, Real-Time Phishing Attack, MERN Stack, Location Verification, Two-factor Authentication, Phishing Attack
format Final Year Project / Dissertation / Thesis
id my-utar-eprints.7183
institution Universiti Tunku Abdul Rahman
publishDate 2025
record_format eprints
spelling my-utar-eprints.71832025-08-28T07:04:46Z Phishing-resistant multi factor authentication Kuek, En Yee T Technology (General) TD Environmental technology. Sanitary engineering TJ Mechanical engineering and machinery The advent of the internet has revolutionized how people connect and interact, but it also brings various severe consequences such as data leakage when weak authentication method is implemented. Two-factor authentication(2FA) is a widely adopted method, yet vulnerabilities have been discovered to bypass it. Traditional 2FA typically combines something a user knows (like a password) with something they have (like a temporary verification code from a physical device). However, this approach is still susceptible to attacks such as phishing attacks, especially Real-Time Phishing(RTP) attack. Location-based multi authentication (MFA) methods have been proposed to mitigate RTP techniques that exploit traditional OTP-based verification. By replacing the OTP mechanism with a geolocation verification step, it add a layer of security to the authentication process. Limitations on previously proposed location-based multi-factor authentication are additional user step for adaptation, mobile-based, and additional costs due to hardware requirements. This paper suggests incorporating location as an extra security layer while maintaining the user-friendliness and seamlessness of existing two-factor authentication methods, thus creating a user-friendly and seamless multifactor authentication solution. The performance of this proposed authentication method is evaluated against various attacks, notably RTP attack. Area of Study: Cybersecurity, Authentication Keywords: Multi-Factor Authentication, Real-Time Phishing Attack, MERN Stack, Location Verification, Two-factor Authentication, Phishing Attack 2025-01 Final Year Project / Dissertation / Thesis NonPeerReviewed application/pdf http://eprints.utar.edu.my/7183/1/fyp_CN_2025_KEY.pdf Kuek, En Yee (2025) Phishing-resistant multi factor authentication. Final Year Project, UTAR. http://eprints.utar.edu.my/7183/
spellingShingle T Technology (General)
TD Environmental technology. Sanitary engineering
TJ Mechanical engineering and machinery
Kuek, En Yee
Phishing-resistant multi factor authentication
title Phishing-resistant multi factor authentication
title_full Phishing-resistant multi factor authentication
title_fullStr Phishing-resistant multi factor authentication
title_full_unstemmed Phishing-resistant multi factor authentication
title_short Phishing-resistant multi factor authentication
title_sort phishing-resistant multi factor authentication
topic T Technology (General)
TD Environmental technology. Sanitary engineering
TJ Mechanical engineering and machinery
url http://eprints.utar.edu.my/7183/1/fyp_CN_2025_KEY.pdf
http://eprints.utar.edu.my/7183/
url_provider http://eprints.utar.edu.my